@@ -25,15 +25,15 @@ access to database objects, and a newly created Hyperscale (Citus) server group
25
25
comes with several roles pre-defined:
26
26
27
27
* The [ default PostgreSQL roles] ( https://www.postgresql.org/docs/current/default-roles.html )
28
- * * azure_pg_admin*
29
- * * postgres*
30
- * * citus*
28
+ * ` azure_pg_admin `
29
+ * ` postgres `
30
+ * ` citus `
31
31
32
32
Since Hyperscale is a managed PaaS service, only Microsoft can sign in with the
33
- * postgres* super user role. For limited administrative access, Hyperscale
34
- provides the * citus* role.
33
+ ` postgres ` super user role. For limited administrative access, Hyperscale
34
+ provides the ` citus ` role.
35
35
36
- Permissions for the citus role:
36
+ Permissions for the ` citus ` role:
37
37
38
38
* Read all configuration variables, even variables normally visible only to
39
39
superusers.
@@ -44,14 +44,14 @@ Permissions for the citus role:
44
44
* [ Create PostgreSQL extensions] ( concepts-hyperscale-extensions.md ) (because
45
45
the role is a member of azure\_ pg\_ admin).
46
46
47
- Notably, the citus role has some restrictions:
47
+ Notably, the ` citus ` role has some restrictions:
48
48
49
49
* Can't create roles
50
50
* Can't create databases
51
51
52
52
## How to create additional users
53
53
54
- As mentioned, the * citus* admin account lacks permission to create additional
54
+ As mentioned, the ` citus ` admin account lacks permission to create additional
55
55
users. To add a user, use the Azure portal interface.
56
56
57
57
1 . Go to the ** Roles** page for your Hyperscale server group, and click ** + Add** :
@@ -73,7 +73,7 @@ a tool such as PgAdmin or psql. (See [connecting with
73
73
psql] ( quickstart-create-hyperscale-portal.md#connect-to-the-database-using-psql )
74
74
in the Hyperscale (Citus) quickstart.)
75
75
76
- For example, to allow * db_user* to read * mytable* , grant the permission:
76
+ For example, to allow ` db_user ` to read ` mytable ` , grant the permission:
77
77
78
78
``` sql
79
79
GRANT SELECT ON mytable TO db_user;
@@ -82,7 +82,7 @@ GRANT SELECT ON mytable TO db_user;
82
82
Hyperscale (Citus) propagates single-table GRANT statements through the entire
83
83
cluster, applying them on all worker nodes. However GRANTs that are system-wide
84
84
(for example, for all tables in a schema) need to be run on every date node. Use the
85
- * run_command_on_workers()* helper function:
85
+ ` run_command_on_workers() ` helper function:
86
86
87
87
``` sql
88
88
-- applies to the coordinator node
@@ -102,7 +102,7 @@ to delete the user or reset their password.
102
102
103
103
![ Edit a role] ( media/howto-hyperscale-create-users/edit-role.png )
104
104
105
- The * citus* role is privileged and can't be deleted.
105
+ The ` citus ` role is privileged and can't be deleted.
106
106
107
107
## Next steps
108
108
0 commit comments